graphlit-mcp-server
by graphlit
Overview
The Model Context Protocol (MCP) Server integrates with the Graphlit platform to ingest diverse data sources, build a searchable knowledge base, and enable LLM-powered search, retrieval, RAG, and generative capabilities for MCP clients.
Installation
npx -y graphlit-mcp-serverEnvironment Variables
- GRAPHLIT_ENVIRONMENT_ID
- GRAPHLIT_ORGANIZATION_ID
- GRAPHLIT_JWT_SECRET
- SLACK_BOT_TOKEN
- DISCORD_BOT_TOKEN
- TWITTER_TOKEN
- TWITTER_CONSUMER_API_KEY
- TWITTER_CONSUMER_API_SECRET
- TWITTER_ACCESS_TOKEN_KEY
- TWITTER_ACCESS_TOKEN_SECRET
- GOOGLE_EMAIL_REFRESH_TOKEN
- GOOGLE_EMAIL_CLIENT_ID
- GOOGLE_EMAIL_CLIENT_SECRET
- GOOGLE_DRIVE_SERVICE_ACCOUNT_JSON
- GOOGLE_DRIVE_CLIENT_ID
- GOOGLE_DRIVE_CLIENT_SECRET
- GOOGLE_DRIVE_REFRESH_TOKEN
- GOOGLE_CLIENT_ID
- GOOGLE_CLIENT_SECRET
- GOOGLE_REFRESH_TOKEN
- MICROSOFT_EMAIL_CLIENT_ID
- MICROSOFT_EMAIL_CLIENT_SECRET
- MICROSOFT_EMAIL_REFRESH_TOKEN
- MICROSOFT_TEAMS_CLIENT_ID
- MICROSOFT_TEAMS_CLIENT_SECRET
- MICROSOFT_TEAMS_REFRESH_TOKEN
- MICROSOFT_CLIENT_ID
- MICROSOFT_CLIENT_SECRET
- MICROSOFT_REFRESH_TOKEN
- LINEAR_API_KEY
- GITHUB_PERSONAL_ACCESS_TOKEN
- JIRA_EMAIL
- JIRA_TOKEN
- NOTION_API_KEY
- DROPBOX_APP_KEY
- DROPBOX_APP_SECRET
- DROPBOX_REFRESH_TOKEN
- BOX_CLIENT_ID
- BOX_CLIENT_SECRET
- BOX_REDIRECT_URI
- BOX_REFRESH_TOKEN
- SHAREPOINT_ACCOUNT_NAME
- SHAREPOINT_CLIENT_ID
- SHAREPOINT_CLIENT_SECRET
- SHAREPOINT_REFRESH_TOKEN
- ONEDRIVE_CLIENT_ID
- ONEDRIVE_CLIENT_SECRET
- ONEDRIVE_REFRESH_TOKEN
- FROM_EMAIL_ADDRESS
Security Notes
The server includes several functionalities that, if exposed to untrusted user input, could lead to severe vulnerabilities: 1. **Server-Side Request Forgery (SSRF):** The `ingestUrl` and `retrieveImages` tools directly accept a `url` parameter and perform `fetch(url)` or delegate to `client.ingestUri(url)`. An attacker could exploit this to make the server request arbitrary internal or external resources, potentially scanning internal networks, accessing sensitive local services, or bypassing firewall rules. 2. **Local File Inclusion (LFI):** The `ingestFile` tool accepts a `filePath` parameter and uses `fs.readFileSync(filePath)`. If an attacker can control this `filePath`, they could read any file on the server's filesystem that the Node.js process has permissions to access (e.g., `/etc/passwd`, `.env` files, SSH keys). 3. **Extensive Environment Variable Reliance:** Full functionality requires numerous environment variables for various third-party integrations (e.g., Slack, GitHub, Google, Twitter, Notion). Improper configuration or exposure of these secrets significantly increases the attack surface for account compromise. While the server's internal logic doesn't appear to contain explicit `eval` or intentional malicious code, the aforementioned input-driven vulnerabilities make it risky to run without robust input validation and strict isolation, especially when processing untrusted data.
Similar Servers
aderyn
A Rust-based Solidity static analyzer that identifies vulnerabilities in smart contracts and provides developer tooling such as LSP and an MCP server for integration with other development environments and AI agents.
thought-chain-mcp
Transforms any AI model into an advanced reasoning engine by providing structured, step-by-step thinking with persistent memory across sessions.
Mastervolt-Deep-Research
Providing agents with access to external execution environments (local filesystem) and AI models (Hugging Face) via the Model Context Protocol, enabling them to perform research tasks involving file operations and diverse AI capabilities.
cainban
A command-line kanban board and an MCP server designed for natural language task management and AI agent integration, enabling AI to decompose tasks and manage project backlogs.